The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are issuing this announcement to raise awareness of the efforts posed by foreign threat actors to spread disinformation in the lead up to, and likely in the days following, the 2024 U.S. general election. Foreign threat actors are knowingly disseminating false claims and narratives that seek to undermine the American people's confidence in the security and legitimacy of the election process
The FBI and CISA have no information suggesting malicious cyber activity against U.S. election infrastructure has compromised the integrity of voter registration information, prevented an eligible voter from casting a ballot, impacted the integrity of any ballots cast, or disrupted the ability to count votes or transmit unofficial election results in a timely manner. However, foreign adversaries may use false or misleading narratives that indicate otherwise to further their objectives of undermining American public confidence in democratic processes and institutions.
While foreign malign influence operations and disinformation targeting American elections are not new, the proliferation of generative artificial intelligence (AI)-enabled tools is exacerbating pre-existing tactics. Generative AI-enabled tools have lowered the barrier for foreign malicious actors to conduct more sophisticated influence campaigns. We are seeing foreign actors use these tools to develop and distribute more compelling synthetic media messaging campaigns and inauthentic news articles, as well as synthetic pictures and deepfakes (video and audio) at greater speed and scale across numerous US- and foreign-based platforms. These efforts to develop content are designed to undermine voter confidence and to entice unwitting consumers of the information to discuss, share, and amplify the spread of false or misleading narratives.
Foreign threat actors use a variety of methods, often in tandem, to knowingly spread and amplify false or misleading claims about voting processes and results, including false claims that the processes or results have been compromised by malicious cyber activity to cast doubt on the legitimacy or outcome of the vote. These actors use commercial firms, paid influence, witting and unwitting Americans, publicly available and dark web media channels, online journals, messaging applications, spoofed websites, emails, text messages, and fake online personas on U.S. and foreign platforms to spread and amplify these false claims.
In previous public service announcements, the FBI and CISA raised awareness about tactics that could be used in foreign malign influence operations to undermine public confidence in elections. Those announcements highlighted foreign threat actors' use of publicly available voter registration information as "evidence" to falsely claim that a cyber operation compromised voting systems or altered election results. Similarly, foreign threat actors may falsely claim that ransomware or distributed denial of service incidents impacting election offices could impact the security or accuracy of vote casting or counting processes.
Russian Influence Efforts
As part of efforts to combat foreign actors who are seeking to interfere in and influence U.S. elections, the Department of Justice (DOJ), in collaboration with federal partners, has taken a series of actions to degrade Russian threat actors' capabilities to conduct these malign influence campaigns.
In July 2024, the DOJ, in coordination with U.S. and international partners, exposed a covert Russian government-operated, AI-enhanced social media bot farm using specialized software to create fictitious social media personas at scale. In September 2024, the DOJ took steps to disrupt Russian government-directed foreign malign influence campaigns by seizing more than 32 internet domains controlled by Russian government malign influence actors. The DOJ also indicted employees of a Russian state-controlled media outlet who covertly funded and directed a U.S.-based company that deployed nearly $10 million to disseminate pro-Russian narratives to a U.S. audience.
Over the course of these actions, the DOJ seized website domains that Russian malign influence actors created and deliberately designed to look like legitimate mainstream news websites (see below for examples). Many of the seized domains employed "cybersquatting," — a method of registering a domain intended to mimic another person's or company’s domain. The images below are screen captures of articles produced by these Russian government actors. These examples include websites such as "washingtonpost.pm", and "fox-news.in," which are not the real websites of the Washington Post and Fox News
Russian malign influence actors also created fake social media profiles posing as U.S. citizens to direct users to these fake news websites and purchased social media advertisements to drive traffic to the specific fake articles on the fake news site. The Appendix at the end of this document provides a compilation of websites that the FBI, Department of State, or Department of Treasury have previously publicly attributed to Russian malign influence actors, as well as websites and social media accounts that the Intelligence Community has attributed to Russian malign influence actors.
Iranian Influence Efforts
In addition to Russia, Iran is also undertaking influence operations as it has in past election cycles, including through its cyber apparatus, targeting current and former U.S. government officials, members of the media, nongovernmental organizations, and individuals associated with U.S. political campaigns. Iran is probably using generative AI and inauthentic personas to hide its hand and attempt to sow discord during the 2024 U.S. election cycle. On September 27, 2024, the DOJ charged three Iranian nationals identified as employees of the Islamic Revolutionary Guard Corps (IRGC), for a wide-ranging hacking conspiracy targeting current and former U.S. officials. The three IRGC employees are alleged to have conspired to hack into accounts of current and former U.S. officials, members of the media, nongovernmental organizations, and individuals associated with U.S. political campaigns. That indictment further alleged that in June 2024, the IRGC conspirators engaged in a "hack-and-leak" operation, in which they sought to weaponize campaign material stolen from a U.S. Presidential campaign. Additionally, the FBI, U.S. Cyber Command, the Department of Treasury, and the United Kingdom's National Cyber Security Centre have previously disseminated a Joint Cybersecurity Advisory that includes a list of malicious domains used by cyber actors working on behalf of the IRGC, which is linked below. We have also seen Iranian actors use similar tactics as Russian malign influence actors where they create inauthentic news sites posing as a legitimate media organization (see example below).
Recommendations
We urge the American public to critically evaluate the sources of the information they consume and to seek out reliable and verified information from trusted sources, such as state and local election officials. Specifically, we recommend the American public take the following precautions:
- Educate yourself and others on the tactics of foreign malign influence operations, including the use of generative AI and deep-fakes, and their goal to undermine American public confidence in U.S. democratic institutions and processes. Greater public awareness may help limit the spread of foreign malign influence campaigns.
- Seek out information from trusted, official sources, such as state and local election officials, and verify reported claims through trusted, official sources before sharing such information.
- To better understand what you are viewing, know the media and social media company policies and citation rules to denote or disclose content created or doctored with generative AI tools. When viewing content, consider who produced it and look for labels that may identify the content as AI-generated.
- Consider reporting information concerning suspicious or criminal activity, to include the distribution of knowingly false information regarding the time, place, or manner of elections designed to deprive individuals of their right to vote, to their local FBI field office.
Role of the FBI and CISA in Elections
The FBI and CISA coordinate closely with federal,state, and local election partners and provide services and information to safeguard U.S. voting processes and maintain the resilience of U.S. elections. The FBI, alongside DOJ prosecutors, is responsible for investigating and prosecuting election crimes, foreign malign influence operations, and malicious cyber activity targeting election infrastructure and other U.S. democratic institutions. The FBI does not investigate, collect, or maintain information on U.S. persons solely for the purpose of monitoring activities protected by the First Amendment. CISA, as the Sector Risk Management Agency for Election Infrastructure, is the federal government lead for working with critical infrastructure owners and operators, including the election infrastructure community, to ensure the security and resilience of election infrastructure from physical and cyber threats.
Victim Reporting and Additional Information
We encourage the public to report information concerning suspicious or criminal activity, to include the distribution of knowingly false information regarding the time, place, or manner of elections designed to deprive individuals of their right to vote, to their local FBI field office (www.fbi.gov/contact-us/field).
For additional assistance to include common terms and best practices, such as media literacy, please visit the following websites:
- Protected Voices | FBI
- #Protect2024 | CISA
- Foreign Malign Influence Center Newsroom | ODNI
- Risk in Focus: Generative AI and the 2024 Election Cycle | CISA
- Securing Election Infrastructure Against the Tactics of Foreign Malign Influence Operations | CISA
- Joint Cybersecurity Advisory: State Sponsored Russian Media Leverages Meliorator Software for Foreign Malign Influence Activity | FBI
- Joint Cybersecurity Advisory: Iranian Cyber Actors Targeting Personal Accounts to Support Operations | FBI